A apresentação está carregando. Por favor, espere

A apresentação está carregando. Por favor, espere

F5’s Advanced Delivery Network

Apresentações semelhantes


Apresentação em tema: "F5’s Advanced Delivery Network"— Transcrição da apresentação:

1

2 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

3 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

4 BIG-IP GTM – Global Traffic Manager
Direciona os usuários automaticamente, baseando-se nas métricas do site ou da rede, ao Data Center de melhor desempenho e disponibilidade, assegurando acesso a aplicações e dados, mesmo em situações de interrupção dos serviços no Data Center primário; Faz com que as organizações obtenham um altíssimo nível de disponibilidade, sem perda de performance. Inclui uma base de dados de geolocalização IP permitindo que o GTM determine onde o usuário está localizado - continente, país e estado; BIG-IP GTM é o único balanceador global que suporta DNSSEC. GTM directs traffic to the best available data center – if one isn’t available, all traffic is directed there. RelayHealth, a SaaS platform connecting patients, providers, pharmacies, payers, and financial institutions, operates two major data centers—one in Atlanta and one in Sacramento—plus several smaller ones. Manage 12 billion financial and clinical transactions a year. Load balancing was handled by host software on each server. Some servers had none, requiring developers to write custom software. This approach led to many variations of application delivery software all trying to operate within the same data center, resulting in intermittent downtime and slow response times. 75% of enterprises have experienced a major disaster or business disruption. Are you prepared? Nearly 75% of all U.S. businesses have experienced a business interruption NOTE: If desired/necessary, can enumerate: 72% of the time suffered from power outages 52% of the time dealt with hardware problems 46% of the time suffered telecommunications failures 43% of the time dealt with software problems Source: Because, things happen! Floods, Fires 9/11 DDoS – even the target of WikiLeaks’ Anonymous DDoS attack! (See DNSSEC section) What would happen if a catastrophic event hit your data center? How would users be re-directed to their applications in another datacenter? How long would it take to redirect them? How much business would it cost in the meantime?

5 Efeicaz na Entrega de Aplicação Global
Distribui os usuários para o melhor Data Center disponível GTM directs traffic to the best available data center – if one isn’t available, all traffic is directed there. RelayHealth, a SaaS platform connecting patients, providers, pharmacies, payers, and financial institutions, operates two major data centers—one in Atlanta and one in Sacramento—plus several smaller ones. Manage 12 billion financial and clinical transactions a year. Load balancing was handled by host software on each server. Some servers had none, requiring developers to write custom software. This approach led to many variations of application delivery software all trying to operate within the same data center, resulting in intermittent downtime and slow response times. 75% of enterprises have experienced a major disaster or business disruption. Are you prepared? Nearly 75% of all U.S. businesses have experienced a business interruption NOTE: If desired/necessary, can enumerate: 72% of the time suffered from power outages 52% of the time dealt with hardware problems 46% of the time suffered telecommunications failures 43% of the time dealt with software problems Source: Because, things happen! Floods, Fires 9/11 DDoS – even the target of WikiLeaks’ Anonymous DDoS attack! (See DNSSEC section) What would happen if a catastrophic event hit your data center? How would users be re-directed to their applications in another datacenter? How long would it take to redirect them? How much business would it cost in the meantime?

6 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

7 Eliminar o tempo ocioso e escalar a aplicação
Começa com o Balanceamento de Carga Garante a disponibilidade e o plano de crescimento Equipamento com alto desempenho Metodos Dinâmicos LB Monitoramento Avançado Persistencia Garantia de Operação IBM's Enterprise Workload Manager Enterprise Workload Manager (EWLM) is a product in the IBM Virtualization Engine Suite for Servers. EWLM dynamically monitor server resources and provides input on load balancing decisions. The Workload Manager takes into account a server's CPU, storage capacity, and network traffic in any final weighting decisions. The Workload Manager uses an implementation of the SASP protocol to perform this task. Protocol specific monitor allows application control based on specific SASP parameters The Server Message Block Protocol (SMB protocol) provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network. SMB (server message block) moniters file servers. Retrieves a list of available shares Can retrieve a specific file from a specific share Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. RPC monitor is an EAV health-check monitor for RPC (Remote Procedure Call). Intelligent Passive monitoring Pool member down via iRule, up via health check Allows monitors to run less frequently Allows pool member to be marked down more quickly after failure observed LTM load balances no nível do aplicativo Garante os melhores recursos sempre selecionados Tem visibilidade em profundidade de saúde aplicativo Proativamente inspeciona e responde a erros Eliminar o tempo ocioso e escalar a aplicação

8 Reduz latência no cliente
Cache Rápido em Ação Primeira Requisição Cache Compressão Próximas Requisições Módulo A caixa BigIP faz cache usando a memória RAM disponível no sistema para guardar cópias do conteúdo de Web sites mais requisitados. O tamanho do repositório é dependente da quantidade de RAM da plataforma e quanto de memória o usuário decide dedicar para fazer cache. Cache Reduz latência no cliente Configurável por VIP memory store Utiliza excesso de RAM Pode guardar conteúdo com compressão ou não Reduz Carga ao servir o conteúdo Reduz carga de conexão no Servidor

9 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

10 BIG-IP LC – Link Controller
Garante que o tráfego seja direcionado ao melhor link de internet possível Elimina os downtimes causados pelas falhas dos provedores de link de internet Disponível na versão standalone somente na série 1600; também disponível como um módulo (licença em software) no LTM 1600, 3600, 3900, 6900 e 8900. GTM directs traffic to the best available data center – if one isn’t available, all traffic is directed there. RelayHealth, a SaaS platform connecting patients, providers, pharmacies, payers, and financial institutions, operates two major data centers—one in Atlanta and one in Sacramento—plus several smaller ones. Manage 12 billion financial and clinical transactions a year. Load balancing was handled by host software on each server. Some servers had none, requiring developers to write custom software. This approach led to many variations of application delivery software all trying to operate within the same data center, resulting in intermittent downtime and slow response times. 75% of enterprises have experienced a major disaster or business disruption. Are you prepared? Nearly 75% of all U.S. businesses have experienced a business interruption NOTE: If desired/necessary, can enumerate: 72% of the time suffered from power outages 52% of the time dealt with hardware problems 46% of the time suffered telecommunications failures 43% of the time dealt with software problems Source: Because, things happen! Floods, Fires 9/11 DDoS – even the target of WikiLeaks’ Anonymous DDoS attack! (See DNSSEC section) What would happen if a catastrophic event hit your data center? How would users be re-directed to their applications in another datacenter? How long would it take to redirect them? How much business would it cost in the meantime?

11 Direciona o tráfego para o melhor ISP
Client Server 1 2 Internet 2 1 ISP1 ISP3 ISP2 BIG-IP Link Controller Inbound - Pedido de cliente Resposta do servidor Outbound - Solicitação do usuário 2) Resposta do Servidor de Internet Firewalls Rede Corporativa Usuários Servidores

12 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

13 O que é compressão? Método para compactar o conteúdo do texto (html, css, javascript) baseado em Browser (IE 4.0+) Texto sem compressão: "Happy Birthday to you! Happy Birthday to you! Happy Birthday Dear Michelle! Happy Birthday to you!" Texto com compressão: "$1 $2 $1 $2 $1 Dear Michelle! $1 $2 $1=[Happy Birthday ] $2=[to you!]" Caracteres antes da compressão: 101 Caracteres depois da compressão: 69 Percentual de compressão: 31.7% Fonte: JMP Securities

14 Benefícios da Compressão
3x mais performance no cliente reduzindo volume de tráfego Ajustes automáticos do Browser Até 66% de redução em BANDA Opção de compressão através de aceleração por hardware também disponível Remove dos servidores a sobrecarga de compressão e aumenta suas capacidades F5 provê a mais rápida Compressão do mercado

15 Cache estático e dinâmico
Reduzir o número de solicitações processadas pelo servidor Clients Aplicações Web A maioria das respostas servido a partir do cache WebAccelerator O cache pode armazenar o conteúdo tanto comprimido e não comprimido Reduz a latência de cliente

16 Fácil de implementar - Fácil de Integrar
One of the most important features of WebAccelerator are the packaging of Validated Web Application acceleration policies. Validated web application acceleration policies are the saved configuration settings to enable the optimal acceleration for popular web applications. F5 has collected the best practices for acceleration for popular web applications (such as Sharepoint, Siebel, Plumtree, and others) from our customers, our SEs, our partners, and our internal architects, and created policies for these applications. We then went to (and continue to go to) the manufacturers of these web applications and validated that these configurations would work with the web applications. These policies are validated by F5 at the manufacturer of the web application to ensure that the optimal web application acceleration is achieved. So, all customers can benefit from the best practices of all. Additionally, this reduces the deployment time from hours to minutes. This is beneficial to the customer and to the partners. The customer can also use these policies as a template for their own custom applications. They can copy and edit these policies to adapt for their needs. Additionally, the customers will be able to share new policies on DevCentral so that the entire community can benefit from the experiences of each other.

17 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

18 Relatórios do ASM Now we have consolidated PCI reports.
With new PCI reporting, BIG-IP ASM details security measures required by PCI DSS 1.2, if you are in compliance and if not, steps required to become compliant.

19 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

20 Redes anônimas com baixa Segurança
Missão Crítica Apps. Endereço IP com identidade diferente RH Convidado Financeiro Contratante SharePoint “A maioria das redes empresariais são anônimos. Gerenciamento de redes ganham visibilidade e controle pela adição de consciência de identidade na rede.” Empregado * “Apresentando a rede com reconhecimento de identidades,” Lawrence Orans, Gartner

21 BIG-IP Access Policy Manager (APM) Autenticação e Autorização de Serviços para BIG-IP
BIG-IP® APM ROI Beneficios: Consolida infraestrutura Reduz os custos de gestão AAA Simplifica o acesso Web BIG-IP® APM Características: Centraliza sinal único na web e serviços de controle de acesso Proxy completo L4 - L7 controle e velocidades de acesso no BIG-IP Adiciona inspeção ponto de extremidade para a política de acesso Editor de Política visuais (VPE) fornece política de controle de acesso baseado VPE Regras - interface de programação para as políticas de acesso personalizado *AAA = Autenticação, Autorização e Contabilidade (para Auditoria)

22 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

23 BIG-IP WAN Optimization Module
iSession Tunnels Compressão Adaptativa Simétrica Políticas baseado em SSL Otimização TCP Descoberta Dinâmica de Endpoint QoS (Qualidade de Serviços) WCCPv2 (Web Cache Communication Protocol V2 – Protocolo Route Cisco) Dashboard Clients File Servers BIG-IP WOM BIG-IP WOM WAN This is VERY open-ended. Remember, you’re describing what’s cool about the feature. Avoid a long dissertation about your decision-making strategy. We covered that in the PDR. Now it’s time to sell it. If the content in this slide doesn’t add momentum to the demo, remove it. Otimização CIFS (Protocolo de Rede) Leitura antecipada dos dados Cache de metadados (dados dos dados) Otimização MAPI (Interface do Microsoft Windows que permite que diferentes aplicações de correio eletrônico em diferentes plataformas para troca de mensagens - Computadores) Permite a deduplicação de dados MAPI Compressão melhora ratios MAPI Deduplicação: Remove bytes padrões repetitivos byte da rede Max SSL & Max Compressão

24 F5’s Advanced Delivery Network
International Data Center Cell PC - Home Enterprise Manager / ControlPoint Aplicações e Armazenamento BIG-IP Link Controller BIG-IP Local Traffic Manager FirePass SSL VPN ARX File/Data Virtualization Remote - WAN BIG-IP Global Traffic Manager BIG-IP Application Security Manager BIG-IP Edge Gateway BIG-IP Web Accelerator WOM Underlying Technology Exists Today to Meet These Needs but we have to evolve to better support the demands PC - LAN iControl TMOS WLAN

25 ARX - Possibilita uma infra-estrutura de armazenamento dinâmico
NAS e File Servers Applications and Users ANTES NAS e File Servers Applications and Users DEPOIS What are the fundamental challenges with managing storage infrastructure today? First, today’s environments are inflexible. Users and applications are tightly coupled with their storage resources, accessing file data through various static mappings or network mount points. The problem is that if you have to change things, or move data, you break those static mappings and cause downtime. Second, today’s environments are overly complex. Many organizations have had to manage their data growth by constantly adding more capacity, or “throwing disk at the problem.” You end up with a sprawl of file systems and a proliferation of storage devices and platforms – and not always from the same vendor – that you now have to manage. Inflexibility and complexity leads to inefficiency. Because it’s so difficult to move data across different devices, platforms, or vendors, traditional environments tend to be inefficient. It’s very difficult to share capacity between different resources, provision on demand, or move data around to balance utilization. As a result of all this, traditional storage environments tend to be overly expensive – not only to build but also to manage. [CLICK] What F5 does is enable a dynamic storage infrastructure: We virtualize the file storage environment to hide changes at the physical layer from users and applications. We enable flexibility in the infrastructure by allowing files to be moved between different file systems or file storage resources, including between resources of different platforms or from different vendors. We provide policies that automate that movement of files for different business purposes or to achieve different business goals.

26 Interface Simples e Poderosa
Management extends beyond the GUI to the hardware itself…next slide Point out Profiles Used to create traffic policies that are used to assign to a virtual server.

27 Dashboard

28 BIG-IP Hardware Line-up
Price BIG-IP 8900 2 x Quad core CPU 16 10/100/ x 1GB SFP 2x 320 GB HD (S/W RAID) + 8GB CF 16 GB memory 58K TPS / 9.6Gb bulk 6 Gbps max hardware compression 12 Gbps Traffic Multiple Product Modules BIG-IP 6900 BIG-IP 3900 2 x Dual core CPU 16 10/100/ x 1GB SFP 2x 320 GB HD (S/W RAID) + 8GB CF 8GB memory 25K TPS / 4 Gb bulk 5 Gbps max hardware compression 6 Gbps Traffic Multiple Product Modules BIG-IP 3600 Quad core CPU 8 10/100/ x 1GB SFP 1x 3000 GB HD + 8GB CF 8 GB memory 15K PS / 2.4 Gb bulk 3.8 Gbps max software compression 4 Gbps Traffic Multiple Product Module BIG-IP 1600 Dual core CPU 8 10/100/ x 1GB SFP 1x 160 GB HD + 8GB CF 4 GB memory 10K TPS / 2 Gb bulk 1 Gbps max software compression 2 Gbps Traffic 1 Advanced Product Module Dual core CPU 4 10/100/ x 1GB SFP 1x 160GB HD 4 GB memory 5K TPS / 1 Gb Bulk 1 Gbps max software compression 1 Gbps Traffic 1 Basic Product Module Escala e Performance

29 ARX Hardware Line-up Price ARX6000: ARX4000: ARX1000: ARX500:
>2B files Up to 24 GbE ports 13 RU Dual Power ARX4000: 2B files 12 GbE ports OR 2 10GbE ports 4 RU Dual Power ARX1000: ~384M files 6 GbE ports 2 RU Single Power ARX500: ~384M files 1 GbE port 1 RU Single Power Escala e Performance

30 VIPRION The World’s Only On Demand ADC

31 Financeiro TI Telco/ISP Media Transportes Outras
Organizações de todo o mundo confiam na F5 para manter seus negócios Incluindo 9 das 10 top empresas de serviços financeiros do mundo e 60% do Global 1000 Financeiro TI Telco/ISP Media Transportes Outras

32 Alguns clientes no Brasil


Carregar ppt "F5’s Advanced Delivery Network"

Apresentações semelhantes


Anúncios Google